Get started with Opsgenie as a user
Learn how to configure your profile, get notifications from Opsgenie and view on-call schedules.
Use Opsgenie’s Evident.io Integration to forward Evident.io alerts to Opsgenie. Opsgenie determines the right people to notify based on on-call schedules– notifies via email, text messages (SMS), phone calls and iOS & Android push notifications, and escalates alerts until the alert is acknowledged or closed.
When a signature is created in Evident.io, an alert is created in Opsgenie automatically through the integration.
If you're using Opsgenie's Free or Essentials plan or if you’re using Opsgenie with Jira Service Management's Standard plan, you can add this integration from your team dashboard only. The Integrations page under Settings is not available in your plan.
Go to Teams and select your team.
Select Integrations on the left navigation and then select Add integration.
Adding the integration from your team dashboard will make your team the owner of the integration. This means Opsgenie will assign the alerts received through this integration to your team only. Follow the rest of the steps in this section to set up the integration.
Go to Settings > Integrations. Search for Evident.io and select Add.
Specify who is notified of Evident.io alerts using the Responders field. Auto-complete suggestions are provided as you type.
Copy the API Key.
Select Save Integration.
In Evident.io, select Control Panel on the upper right side of the window.
Select the Integrations tab from the side menu.
Select the Webhook option.
4. Paste integration API URL into URL field.
5. Enter the maximum number of alerts that may be sent through this integration every minute into Throttle Rate field.
6. Check the alert types and signatures to receive.
7. Click Submit.
8. Fill out the Integration Configuration form.
9. Click Save.
JSON
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
{
"data": {
"id": "259835974",
"type": "alerts",
"attributes": {
"created_at": "2016-11-08T12:46:55.000Z",
"status": "pass",
"resource": "opsgenie-app",
"updated_at": "2016-11-09T09:45:04.000Z",
"started_at": "2016-11-08T12:46:55.000Z",
"ended_at": null
},
"relationships": {
"external_account": {
"data": {
"id": "4055",
"type": "external_accounts"
},
"links": {
"related": "https://esp.evident.io/api/v2/external_accounts/4055.json"
}
},
"region": {
"data": {
"id": "9",
"type": "regions"
},
"links": {
"related": "https://esp.evident.io/api/v2/regions/9.json"
}
},
"signature": {
"data": {
"id": "136",
"type": "signatures"
},
"links": {
"related": "https://esp.evident.io/api/v2/signatures/136.json"
}
},
"custom_signature": {
"data": null,
"links": {
"related": null
}
},
"suppression": {
"data": null,
"links": {
"related": null
}
},
"metadata": {
"data": {
"id": "258238708",
"type": "metadata"
},
"links": {
"related": "https://esp.evident.io/api/v2/alerts/259835974/metadata.json"
}
},
"cloud_trail_events": {
"data": [],
"links": {
"related": "https://esp.evident.io/api/v2/alerts/259835974/cloud_trail_events.json"
}
},
"tags": {
"data": [],
"links": {
"related": "https://esp.evident.io/api/v2/alerts/259835974/tags.json"
}
}
}
},
"included": [
{
"id": "4055",
"type": "external_accounts",
"attributes": {
"created_at": "2016-11-08T12:28:31.000Z",
"name": "OpsGenie Development",
"updated_at": "2016-11-09T06:26:22.000Z",
"arn": "arn:aws:iam::729181177740:role/Evident-Service-Role",
"account": "729181177740",
"external_id": "960f0836-b71f-45d3-a54f-4cf1608804c7",
"cloudtrail_name": null
},
"relationships": {
"organization": {
"links": {
"related": "https://esp.evident.io/api/v2/organizations/1874.json"
}
},
"sub_organization": {
"links": {
"related": "https://esp.evident.io/api/v2/sub_organizations/3426.json"
}
},
"team": {
"links": {
"related": "https://esp.evident.io/api/v2/teams/4000.json"
}
},
"scan_intervals": {
"links": {
"related": "https://esp.evident.io/api/v2/external_accounts/4055/scan_intervals.json"
}
}
}
},
{
"id": "9",
"type": "regions",
"attributes": {
"code": "global",
"created_at": "2014-06-05T23:42:37.000Z",
"updated_at": "2014-06-05T23:42:37.000Z"
}
},
{
"id": "136",
"type": "signatures",
"attributes": {
"created_at": "2016-09-07T16:30:14.000Z",
"description": "\"IAM users can access AWS resources using different types of credentials, such as passwords or access keys. Best security practice is to remove or deactivate any credentials that have been unused in the last 90 days. Disabling or removing unnecessary credentials will reduce the window of opportunity for credentials associated with a compromised or abandoned account to be used. This signature scans for any such incidents and generates a report if one is discovered.\"",
"identifier": "AWS:IAM-014",
"name": "Unused IAM User Credentials",
"resolution": "\"To resolve this alert:Open the AWS IAM Console. Go to Users, select the user identified in the alert.Select the Security Credentials tab.Click Manage Password.Click Remove Existing Password to prevent the user from logging in until their credentials can be verified.For more information: see AWS: IAM documentation.\"",
"risk_level": "Low",
"updated_at": "2016-11-01T17:17:43.000Z"
},
"relationships": {
"service": {
"links": {
"related": "https://esp.evident.io/api/v2/services/4.json"
}
}
}
},
{
"id": "258238708",
"type": "metadata",
"attributes": {
"data": {
"details": {
"arn": "arn:aws:iam::729181177740:user/opsgenie-app",
"message": "User has logged in in the past 90 days",
"username": "opsgenie-app"
}
}
}
}
]
}
Was this helpful?